FINDING · DETECTION
When a censor controls the WebRTC signaling plane, it can mount MITM attacks against CRON's vanilla covert encoding because the encoding 'fully replaces the video payload with an apparently random covert data signal that results in a scrambled video image at the receiver's endpoint.' By replaying the captured video through a WebRTC gateway, the censor obtains direct visual evidence of payload manipulation.
From 2020-barradas-towards — Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels · §4.2 · 2020 · Distributed Infrastructure for Common Good
Implications
- Any covert channel that fully replaces cover-medium content with random bytes is trivially detectable by an adversary controlling the carrier service; designs must embed covert data in a way that preserves the perceptual and statistical properties of the original medium.
- Out-of-band key exchange for endpoint authentication is mandatory when the carrier signaling infrastructure may be adversary-controlled; in-band key negotiation through censor-controlled servers provides no security.
Tags
Extracted by claude-sonnet-4-6 — review before relying.